1983
DOI: 10.1109/tit.1983.1056723
|View full text |Cite
|
Sign up to set email alerts
|

On the capacity of computer memory with defects

Abstract: A computer memory with defects is modeled as a discrete memoryless channel with states that are statistically determined. The storage capacity is found when complete defect information is given to the encoder or to the decoder, and when the defect information is given completely to the decoder but only partially to the encoder. Achievable storage rates are established when partial defect information is provided at varying rates to both the encoder and the decoder. Arimoto-Blahut type algorithms are used to com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
287
0
2

Year Published

1984
1984
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 287 publications
(292 citation statements)
references
References 10 publications
3
287
0
2
Order By: Relevance
“…The recipient does not know the set S. This is an example of a channel known as an n-bit memory with up to n -k defective cells introduced in 1974 by Kuznetsov et al [14]. It is known that the Shannon capacity of this channel is k/n [15][16][17] and can be achieved for non-binary alphabets using an algebraic coding scheme with the cosets of an MDS code as bins [16]. The same paper contains a noisy generalization of this channel and shows that nested linear codes (or "partitioned" codes) are capable of achieving the theoretical maximum capacity.…”
Section: Example 3 (Jpeg Compression)mentioning
confidence: 99%
See 2 more Smart Citations
“…The recipient does not know the set S. This is an example of a channel known as an n-bit memory with up to n -k defective cells introduced in 1974 by Kuznetsov et al [14]. It is known that the Shannon capacity of this channel is k/n [15][16][17] and can be achieved for non-binary alphabets using an algebraic coding scheme with the cosets of an MDS code as bins [16]. The same paper contains a noisy generalization of this channel and shows that nested linear codes (or "partitioned" codes) are capable of achieving the theoretical maximum capacity.…”
Section: Example 3 (Jpeg Compression)mentioning
confidence: 99%
“…This setup is an example of coset coding. The message is communicated as a syndrome with parity check matrix H. As opposed to the approach by Heegard [15] who proposed a fixed rate code for memory with defective cells, we use a variable rate random linear code with a pseudo-random matrix. This randomization offers flexibility for our steganographic application in which k varies greatly depending on the cover object and a steganographic method.…”
Section: Encoder and Decodermentioning
confidence: 99%
See 1 more Smart Citation
“…We also neglect the small O log n n term. We consider the memory with stuck-at faults example [54] (see also [1,Example 7.3]). The state S = 0 correspond to a faculty memory cell that output 0 independent of the input value, the state S = 1 corresponds to a faculty memory cell that outputs 1 independent of the input value, and the state S = 2 corresponds to a binary symmetric channel with crossover probability α.…”
Section: B Numerical Example For Gp Problemmentioning
confidence: 99%
“…The main problem was to establish the highest possible rates of reliable communications in such channels [3]- [6] that is related to the optimal solution to the problem of channel interference cancellation.…”
mentioning
confidence: 99%